(Yifeng Ding) In this article, I will explain how to extend native message box in managed code. There’re two functions that I will add to the message box. –Displays a countdown message, automatically closes the message box when specified timeout expired, and returns the default selection of the
Tag: Development
Overloading and Overriding in Visual Basic.NET 2005
(Jagadish Chaterjee) This article gives you an in-depth understanding of the differences between overloading and overriding in Visual Basic.NET 2005. It is assumed that the reader knows something about object-oriented programming in Visual Basic.NET.
Creating Custom NUnit Assertions
(Brian Mains) NUnit is an excellent utility in supporting application development. Based on JUnit, NUnit tests .NET applications by making assertions about the code, allowing you to compare properties within your objects for certain values. For the unit test to succeed, all of the assertions must ev
.NET Building Blocks: Build a RichTextBox-Based Syntax-Highlighting Editor and IDE
(Michael Sorens) How difficult do you think it would be to create a SQL tool like Query Analyzer or SqlServer Management Studio? How about a programming and execution framework for VBScript? Or how about a dual code-and-WYSIWYG editor for HTML—or a development IDE for creating and testing XSLT trans
Handling Windows Forms Data Binding Errors
(Jon Kruger) Data binding is great, but one thing that newbies do not know is that data binding will eat exceptions and never tell you – unless you know what events to listen to.
Hosting a .NET Application in a Web Farm
(Tejaswini Das) A Web server farm or simply Web farm is a group of computers acting as servers and housed together in a single location. A server farm is sometimes called a server cluster. A Web server farm can be either (1) a Web site that has more than one server or (2) an Internet service provide
Implementing Effective Vulnerability Remediation Strategies Within the Web Application Development Lifecycle
(Caleb Sima) Once you’ve completed a security assessment as a part of your web application development, it’s time to go down the path of remediating all of the security problems you uncovered. At this point, your developers, quality assurance testers, auditors, and your security managers should all
ReaderWriterLock
(Jim Mischel) The Monitor lock that we’ve been discussing in previous sections is something of a blunt instrument. You can use it to coordinate exclusive access to a section of code or a data structure, but that’s it. It turns out, though, that often you’d like multiple readers to have access to an
A Scrollable MessageBox in .NET and C#
(Mike Gold) This article demonstrates how to create a message box that contains messages that scroll. This message box also allows you to read the message in from a file as well as change fonts and color properties.
An Epilogue to Cryptography
(Barzan “Tony” Antal) This is the last part of a three-part series covering encryption and decryption, with a focus on the algorithms used. If you have missed either the first or second part, I encourage you to check them out before reading this part.
